[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

Security of underwater and air–water wireless communication: State-of-the-art, challenges and outlook

W Aman, S Al-Kuwari, M Muzzammil, MMU Rahman… - Ad Hoc Networks, 2023 - Elsevier
The technologies used in underwater and air–water (A–W) wireless communication
networks (WCN) are increasingly attracting attention due to numerous modern applications …

Underwater and Air-Water Wireless Communication: State-of-the-art, Channel Characteristics, Security, and Open Problems

W Aman, S Al-Kuwari, A Kumar, MMU Rahman… - arXiv preprint arXiv …, 2022 - arxiv.org
We present a first detailed survey on underwater and air-water (AW) wireless
communication networks (WCNs) that mainly focuses on the security challenges and the …

RETRACTED ARTICLE: An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)

MS Sumalatha, V Nandalal - Journal of Ambient Intelligence and …, 2021 - Springer
Wireless sensor networks (WSNs) have a significant number of sensing nodes with
computing and communication resources for data transmission. Many essential aspects …

A comprehensive overview on application of trust and reputation in wireless sensor network

GEP Kumar, I Titus, SI Thekkekara - Procedia Engineering, 2012 - Elsevier
Trust is being deployed along side with cryptography in WSN to achieve better security. This
paper describes about how the various systems that are designed to act against attacks with …

Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks

IA Umar, ZM Hanapi, A Sali, ZA Zulkarnain - IEEE Access, 2017 - ieeexplore.ieee.org
The cross-layering concept has enabled flexibility in sensor communication by decreasing
the level of modularity through inter-layer information exchange. This has improved …

A flexible and compact hardware architecture for the SIMON block cipher

E Gulcan, A Aysu, P Schaumont - … 2014, Istanbul, Turkey, September 1-2 …, 2015 - Springer
SIMON is a recent, light-weight block cipher developed by NSA. Previous work on SIMON
shows that it is a very promising alternative of AES for resource-constrained platforms. While …

System for Malicious Node Detection in IPv6‐Based Wireless Sensor Networks

K Grgic, D Zagar, V Krizanovic Cik - Journal of Sensors, 2016 - Wiley Online Library
The trend of implementing the IPv6 into wireless sensor networks (WSNs) has recently
occurred as a consequence of a tendency of their integration with other types of IP‐based …

SKWN: Smart and dynamic key management scheme for wireless sensor networks

S Mesmoudi, B Benadda… - International Journal of …, 2019 - Wiley Online Library
In the era of the Internet of Things (IoT), we are witnessing to an unprecedented data
production because of the massive deployment of wireless sensor networks (WSNs) …

Arraymetrics: Authentication through chaotic antenna array geometries

M Karabacak, B Peköz, G Mumcu… - IEEE Communications …, 2021 - ieeexplore.ieee.org
Advances in computing have resulted in an emerging need for multi-factor authentication
using an amalgamation of cryptographic and physical keys. This letter presents a novel …